Patents by Inventor Ana Maxim
Ana Maxim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250217458Abstract: Systems, methods, and apparatus are provided for tracking user interactions in a quantum system. An authentication persona may be routed to a quantum processor. The quantum processor may generate a virtual quantum channel. The virtual quantum channel may execute multiple attribute-based authentication chains concurrently. The quantum processor may dynamically change the attributes in the authentication chains for the duration of a user session. The quantum processor may substantially continuously validate the attributes in each chain for the duration of the user session. The quantum processor may map the virtual authentication channel to a potential state of quantum information. In some embodiments, the system may automatically scale the quantum processor during an authentication task by adding additional quantum circuits to each quantum thread when the authentication task has a duration that is longer than a threshold duration and/or a volume that is larger than a threshold volume.Type: ApplicationFiled: January 1, 2024Publication date: July 3, 2025Inventors: Michael Young, Manu Kurian, Ana Maxim
-
Patent number: 12346418Abstract: Systems and Method are provided for an Anti-Pattern Captcha. Methods may include AI software receiving a request from a user to access a system or website, the request comprising user credentials. Methods may include the AI software identifying a human user associated with the user credentials. Methods may include the AI software compiling data related to a plurality of unique behavior patterns associated with the human user when interacting online. Methods may include the AI software analyzing the compiled data to establish the unique behavior patterns. Methods may include the AI software presenting a challenge to the user. Methods may include the AI software verifying that the user is the human user upon a response to the challenge that deviates from at least one of the unique behavior patterns. Methods may include the AI software prompting the user to interact with the system or website upon verification.Type: GrantFiled: July 17, 2023Date of Patent: July 1, 2025Assignee: Bank of America CorporationInventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Patent number: 12260694Abstract: Systems, computer program products, and methods are described herein for token thread authentication system for physical space access. The present invention is configured to extract and organize collected NFTs and tokens within a first plurality of threads in accordance with a set of chronological and authenticating parameters. The present invention is structured to interact with an entity network system to receive authenticating requirements, query stored tokens, and present a token thread for achieving authentication. The system is structured to verify the token thread authentication and to grant access to a location to a requesting user. The system is configured to generate and to present a display associated with the token thread authentication process.Type: GrantFiled: July 19, 2022Date of Patent: March 25, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Victoria L. Dravneek, Manu Jacob Kurian, Ana Maxim
-
Patent number: 12242639Abstract: Methods and system are provided for tuning an artificial intelligence (“AI”) system. The methods and system may include training the AI system to identify distinct users their distinct interactions. The training may include receiving datatsets related to a plurality of distinct users and their plurality of distinct interactions. The AI system may parse the datasets to arrive at a plurality of sets of distinct interactions performed by respective distinct users, each distinct interaction may be associated with a level of security clearance. The AI system may receive a request from a user to access information. The methods and system may include the AI system initiating a communication with the user. The communication may be compared with the each set of distinct interactions until a user and level of security can be identified. The AI system may prompt the user to access information on the level of security clearance identified.Type: GrantFiled: July 17, 2023Date of Patent: March 4, 2025Assignee: Bank of America CorporationInventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250039149Abstract: A personal artificial intelligence (AI) system may be used to conduct business with one or more entities. The personal AI system may automatically replicate security rules from another AI system to provide initial security rules and may adjust the initial security rules based on information about the user to generate revised security rules. The rules adjustments may also be based on the entities with which the user does business. An AI firewall may be generated to control access to the personal AI system by a second AI system, with which business may be conducted. To permit interactions with the second AI system, the AI firewall may require that the second AI system provide the personal AI system with data relating to previous transactions between the user and the operator of the second AI system. The data may include the monetary amount of each of multiple recent transactions.Type: ApplicationFiled: July 25, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250039166Abstract: Apparatus and methods to verify human interaction through digital tokens are provided. A human verification program may create a principal digital token and assign it to the profiles of a plurality of users. When a first user of the plurality of users requests verification that a second user of the plurality of users is human and not a bot, the program may transmit the principal token to the second user. The second user may perform a verifiably human action and create a secondary token. The secondary token may be transmitted to the program. The program may analyze the secondary token and create a limited verification token when the second user is human and not a bot. The verification token may be transmitted to the first user.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Michael Young, Vinesh Patel
-
Publication number: 20250039170Abstract: Apparatus and methods to verify human interaction through an encrypted channel are provided. A human verification program may create an encrypted channel between two or more devices when a communication between users of the devices is started. Data may be transferred over the encrypted channel when a user performs a verifiably human action. The data may be analyzed to determine whether the user is more likely than not a bot. The channel may be collapsed when a pre-determined condition is satisfied.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250036754Abstract: Apparatus and methods for an artificial intelligence implemented termination by an auditor artificial intelligence (“aAI”) of a malicious artificial intelligence (“mAI”) are provided. The aAI may detect a mAI on a network and determine which data the mAI can access on the network. The aAI may then degrade all or part of the data in various ways to prevent the mAI from producing valid content based on the data. The aAI may also create code and inject the code into the mAI to degrade the mAI's operations. As the mAI may rely on valid data to produce valid output, degrading the data may degrade the mAI.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250037003Abstract: Artificial intelligence (AI) systems may manipulate search results about an entity to inject a predetermined bias into the search results. A bias reduction artificial intelligence (AI) system and method may perform the same automated search about the entity on open source and closed source AI systems. The AI-generated search results for the open and closed source AI systems may be compared to determine differences in results. The differences may be analyzed to determine attempts by the AI systems to manipulate search results about the entity to inject predetermined bias. If an attempt at predetermined bias is identified, the bias reduction AI system may reduce the predetermined bias by sharing data about the entity between the open source AI system and the closed source AI system to cause the system to use machine learning to update the algorithms and the first and second data sets. Incentives may also be provided to the open and closed source AI systems to reduce biases.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250028704Abstract: Systems and methods for an artificial intelligence-based auditor of artificial intelligence may be provided. The artificial-intelligence-based auditor may operate on one or more hardware processors. The artificial intelligence-based auditor may continually scan one or more operating artificial intelligence systems for productivity and operability. The scan may identify a data source powering the one or more operating artificial intelligence systems. The scan may measure a delta between an output from each of the one or more operating artificial intelligence systems. The scan may identify trends in quality of the one or more operating artificial intelligence systems. The scan may analyze instances where the one or more operating artificial intelligence systems outputted data outside of a parameter range. Based on the scan, the auditor may label each of the one or more operating artificial intelligence systems as positive, neutral or negative.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250028977Abstract: Systems and methods for an artificial intelligence-based auditor of artificial intelligence may be provided. The artificial-intelligence-based auditor may operate on one or more hardware processors. The artificial intelligence-based auditor may continually scan one or more operating artificial intelligence systems for productivity and operability. The scan may identify a data source powering the one or more operating artificial intelligence systems. The scan may measure a delta between an output from each of the one or more operating artificial intelligence systems. The scan may identify trends in quality of the one or more operating artificial intelligence systems. The scan may analyze instances where the one or more operating artificial intelligence systems outputted data outside of a parameter range. Based on the scan, the auditor may label each of the one or more operating artificial intelligence systems as positive, neutral or negative.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250030701Abstract: A method for securing communications received at an automated chatbot within an entity network is provided. The method may enable securing the communications by monitoring inputs received at the automated chatbot in order to identify whether there may be a probability that the input is generated by an artificial intelligence (“AI”) program. The method may include receiving a request to initiate a chat session at the automated chatbot. Each input received at the automated chatbot may be simultaneously retrieved by a processor associated with the chatbot for verifying. Each input may be analyzed by an AI auditor application in comparison to trained data stored in an AI model. The trained data may include characteristics that may be associated with input generated by the AI program. When any inputs correspond to the trained data, the AI auditor may pause the chat session at the automated chatbot and/or terminate the chat session.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Michael Young, Vinesh Patel
-
Publication number: 20250028799Abstract: Apparatus, methods and systems for continual biometric authentication of a user on a user device is provided. Methods may create, for the user, a biometric authentication reference model. Methods may store the biometric authentication reference model at a database associated with the user device. In response to an instantiation of a session by the user on the user device, methods may execute a continual biometric scan. The scanning may be executed until the session is terminated. Methods may identify a number of comparison points between the scanned and stored biometric identifiers. In response to determining that the number of identified comparison points is below a predetermined threshold number of comparison points, methods may initiate a passcode request. The passcode request may request a confirmation of a preset user-selected passcode. In response to determining that the passcode response does not match the preset user-selected passcode, methods may terminate the session.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250028798Abstract: Artificial intelligence (AI) impersonation detection using an AI model is provided. Methods may train an AI model. The training may provide the AI model with a first dataset including a communication between two or more human users, a second and third dataset including an impersonation of the communication by a public AI model and a private AI model respectively. Methods may identify a first identifier set in the first dataset, a second identifier set in the second dataset and a third identifier set in the third dataset. Methods may create a parameter range for the first, second and third identifier set. The methods may include monitoring a production communication using the AI model. The AI model may compare the production communication with the parameter ranges. Methods may identify a smallest comparison value. Methods may, based on the identified smallest comparison value, identify the origin of the production communication.Type: ApplicationFiled: July 20, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Young Patel, Michael Young
-
Publication number: 20250028797Abstract: Systems and Method are provided for an Anti-Pattern Captcha. Methods may include AI software receiving a request from a user to access a system or website, the request comprising user credentials. Methods may include the AI software identifying a human user associated with the user credentials. Methods may include the AI software compiling data related to a plurality of unique behavior patterns associated with the human user when interacting online. Methods may include the AI software analyzing the compiled data to establish the unique behavior patterns. Methods may include the AI software presenting a challenge to the user. Methods may include the AI software verifying that the user is the human user upon a response to the challenge that deviates from at least one of the unique behavior patterns. Methods may include the AI software prompting the user to interact with the system or website upon verification.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20250028851Abstract: Methods and system are provided for tuning an artificial intelligence (“AI”) system. The methods and system may include training the AI system to identify distinct users their distinct interactions. The training may include receiving datatsets related to a plurality of distinct users and their plurality of distinct interactions. The AI system may parse the datasets to arrive at a plurality of sets of distinct interactions performed by respective distinct users, each distinct interaction may be associated with a level of security clearance. The AI system may receive a request from a user to access information. The methods and system may include the AI system initiating a communication with the user. The communication may be compared with the each set of distinct interactions until a user and level of security can be identified. The AI system may prompt the user to access information on the level of security clearance identified.Type: ApplicationFiled: July 17, 2023Publication date: January 23, 2025Inventors: Manu Kurian, Ana Maxim, Vinesh Patel, Michael Young
-
Publication number: 20240169037Abstract: A system includes a memory and a processor coupled to the memory. The processor receives a user credential associated with a user and authorizes an avatar of the user to enter a virtual environment. The processor monitors a plurality of data interactions associated with the first user that are performed in the virtual environment, records information relating to a set of parameters that correspond to a first user profile associated with the first user and determines a first confidence indicator for the first user relating to the first user profile. The processor receives a request from a second user for the first confidence indicator, obtains the first confidence indicator and transmits the obtained first confidence indictor to a user device of the second user.Type: ApplicationFiled: November 22, 2022Publication date: May 23, 2024Inventors: Victoria Lynn Dravneek, Manu Jacob Kurian, Ana Maxim
-
Publication number: 20240171413Abstract: A system includes a memory and a processor coupled to the memory. The processor receives a first user credential associated with a first user and authorizes a first avatar of the first user to enter a virtual environment. The processor receives a first request from the first user to receive virtual data objects for at least one target entity and, in response, generates a virtual sub-environment within the virtual environment. The processor authorizes a second user to access the virtual sub-environment and receives a set of conditions from the second user relating to how a first set of virtual data objects is to be distributed to the at least one target entity. The processor receives and transfers the first set of virtual data objects to the at least one target entity based on the set of conditions.Type: ApplicationFiled: November 22, 2022Publication date: May 23, 2024Inventors: Victoria Lynn Dravneek, Manu Jacob Kurian, Ana Maxim
-
Publication number: 20240031153Abstract: Systems, computer program products, and methods are described herein for token thread authentication system for physical space access. The present invention is configured to extract and organize collected NFTs and tokens within a first plurality of threads in accordance with a set of chronological and authenticating parameters. The present invention is structured to interact with an entity network system to receive authenticating requirements, query stored tokens, and present a token thread for achieving authentication. The system is structured to verify the token thread authentication and to grant access to a location to a requesting user. The system is configured to generate and to present a display associated with the token thread authentication process.Type: ApplicationFiled: July 19, 2022Publication date: January 25, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Victoria L. Dravneek, Manu Jacob Kurian, Ana Maxim
-
Publication number: 20220027865Abstract: Embodiments of the invention are directed to a system, method, or computer program product for an auxiliary hub for passive resource conversion and collection. The system generations and provides a centralized hub for passive resource conversion. The passive resources may be linked from a third party to the hub for direct extraction of the passive resource to the hub. Furthermore, the system may translate the passive resource into active resource via a modification ratio based on the type of passive resource and passive resource provider. The user may then be able to utilize this centralized auxiliary hub for completion or partial completion of resource distributions. The invention further provides a graphical user interface that integrates the centralized auxiliary hub with user mobile applications, on-line applications, and the like allowing for partial selection from the hub and other resource sources for distribution.Type: ApplicationFiled: July 22, 2020Publication date: January 27, 2022Applicant: BANK OF AMERICA CORPORATIONInventors: Justin Riley DuPont, Charles Jason Burrell, Tony England, Catherine Goss, Michael Robert Hasslinger, Christina Ann Lillie, John Allen Sellers, Vincent Butler, John Livaditis, Karen Lea MacQueen, Ana Maxim